Search

Showing total 303,013 results

Search Constraints

Start Over You searched for: Database Springer Nature eBooks Remove constraint Database: Springer Nature eBooks Publisher springer berlin heidelberg Remove constraint Publisher: springer berlin heidelberg
303,013 results

Search Results

51. SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies

52. Regulatory Considerations on Centralized Aspects of DeFi Managed by DAOs

53. Risk Framework for Bitcoin Custody Operation with the Revault Protocol

54. Mining for Privacy: How to Bootstrap a Snarky Blockchain

55. Another Look at Extraction and Randomization of Groth’s zk-SNARK

56. Generic Plaintext Equality and Inequality Proofs

57. Somewhere Statistically Binding Commitment Schemes with Applications

58. BooLigero: Improved Sublinear Zero Knowledge Proofs for Boolean Circuits

59. SoK: Securing Email—A Stakeholder-Based Analysis

60. : Efficient Comparison for Secure Multi-Party Computation

61. Shielded Computations in Smart Contracts Overcoming Forks

62. The Complex Shape of Anonymity in Cryptocurrencies: Case Studies from a Systematic Approach

63. Timelocked Bribing

64. A Formal Model of Algorand Smart Contracts

65. DAHash: Distribution Aware Tuning of Password Hashing Costs

66. Practical Post-quantum Few-Time Verifiable Random Function with Applications to Algorand

67. High-Threshold AVSS with Optimal Communication Complexity

68. Under the Hood of the Ethereum Gossip Protocol

69. Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial Trading

70. Multi-instance Publicly Verifiable Time-Lock Puzzle and Its Applications

71. Fine-Grained Forward Secrecy: Allow-List/Deny-List Encryption and Applications

72. Faster Homomorphic Encryption over GPGPUs via Hierarchical DGT

73. Reparo: Publicly Verifiable Layer to Repair Blockchains

74. Efficient State Management in Distributed Ledgers

75. Lost in Transmission: Investigating Filtering of COVID-19 Websites

76. What’s in Score for Website Users: A Data-Driven Long-Term Study on Risk-Based Authentication Characteristics

77. Blockchain CAP Theorem Allows User-Dependent Adaptivity and Finality

78. Instant Block Confirmation in the Sleepy Model

79. Fraud and Data Availability Proofs: Detecting Invalid Blocks in Light Clients

80. HaPPY-Mine: Designing a Mining Reward Function

81. Payment Trees: Low Collateral Payments for Payment Channel Networks

82. PoSAT: Proof-of-Work Availability and Unpredictability, Without the Work

83. SoK: Communication Across Distributed Ledgers

90. New Standards for E-Voting Systems: Reflections on Source Code Examinations

91. Post-quantum Online Voting Scheme

92. Cast-as-Intended: A Formal Definition and Case Studies

93. Measuring Illicit Activity in DeFi: The Case of Ethereum

94. Global Order Routing on Exchange Networks

95. Wendy Grows Up: More Order Fairness

96. A Game-Theoretic Analysis of Cross-ledger Swaps with Packetized Payments

97. Optimal Fees for Geometric Mean Market Makers

98. How to Exploit a DeFi Project

99. Measuring Asset Composability as a Proxy for DeFi Integration

100. Coins, Covid, Keynes and K-Shaped Recovery